VPN
VPN
VPN
The Virtual Private Network - VPN - has attracted the attention of many organizations
looking to both expand their networking capabilities and reduce their costs.
The VPN can be found in workplaces and homes, where they allow employees to safely
log into company networks. Telecommuters and those who travel often find a VPN a
more convenient way to stay connected to the corporate intranet . No matter your current
involvement with VPNs, this is a good technology to know something about. This VPN
tutorial involves many interesting aspects of network protocol design, Internet security,
network service outsourcing, and technology standards.
A VPN supplies network connectivity over a possibly long physical distance. In this
respect, a VPN is a form of Wide Area Network (WAN) .
The key feature of a VPN, however, is its ability to use public networks like the Internet
rather than rely on private leased lines. VPN technologies implement restricted-access
networks that utilize the same cabling and routers as a public network, and they do so
without sacrificing features or basic security.
The potential problems with the VPN outnumber the advantages and are generally more
difficult to understand. The disadvantages do not necessarily outweigh the advantages,
however. From security and performance concerns, to coping with a wide range of
sometimes incompatible vendor products, the decision of whether or not to use a VPN
cannot be made without significant planning and preparation.
• PPTP
• L2TP
• IPsec
The Virtual Private Network - VPN - has attracted the attention of many
organizations looking to both expand their networking capabilities and reduce
their costs
What Is a VPN?
A VPN supplies network connectivity over a possibly long physical distance. In this
respect, a VPN is a form of Wide Area Network (WAN) . VPNs enable file sharing, video
conferencing and similar network services. Virtual private networks generally don't
provide any new functionality that isn't already offered through alternative mechanisms,
but a VPN implements those services more efficiently / cheaply in most cases.
A key feature of a VPN is its ability to work over both private networks as well as public
networks like the Internet. Using a method called tunneling , a VPN use the same
hardware infrastructure as existing Internet or intranet links. VPN technologies includes
various security mechanisms to protect the virtual, private connections.
In recent years, many organizations have increased the mobility of their workers by
allowing more employees to telecommute. Employees also continue to travel and face a
growing need to stay connected to their company networks.
A VPN can be set up to support remote, protected access to the corporate home offices
over the Internet. An Internet VPN solution uses a client/server design works as follows:
1. A remote host (client) wanting to log into the company network first connects
to any public Internet Service Provider (ISP) .
2. Next, the host initiates a VPN connection to the company VPN server . This
connection is made via a VPN client installed on the remote host.
3. Once the connection has been established, the remote client can
communicate with the internal company systems over the Internet just as if it
were a local host.
Before VPNs, remote workers accessed company networks over private leased lines or
through dialup remote access servers. While VPN clients and servers careful require
installation of hardware and software, an Internet VPN is a superior solution in many
situations.
Internal networks may also utilize VPN technology to implement controlled access to
individual subnets within a private network. In this mode of operation, VPN clients
connect to a VPN server that acts as the network gateway.
This type of VPN use does not involve an Internet Service Provider (ISP) or public
network cabling. However, it allows the security benefits of VPN to be deployed inside
an organization. This approach has become especially popular as a way for businesses
to protect their WiFi local networks.
VPNs vs leased lines - Organizations historically needed to rent network capacity such
as T1 lines to achieve full, secured connectivity between their office locations. With a
VPN, you use public network infrastructure including the Internet to make these
connections and tap into that virtual network through much cheaper local leased lines or
even just broadband connections to a nearby Internet Service Provider (ISP) .
Long distance phone charges - A VPN also can replace remote access servers and
long-distance dialup network connections commonly used in the past by business
travelers needing to access to their company intranet . For example, with an Internet
VPN, clients need only connect to the nearest service provider's access point that is
usually local.
Support costs - With VPNs, the cost of maintaining servers tends to be less than other
approaches because organizations can outsource the needed support from professional
third-party service providers. These provides enjoy a much lower cost structure through
economy of scale by servicing many business clients.
Internet based VPNs avoid this scalability problem by simply tapping into the the public
lines and network capability readily available. Particularly for remote and international
locations, an Internet VPN offers superior reach and quality of service.
Using a VPN
To use a VPN, each client must possess the appropriate networking software or
hardware support on their local network and computers. When set up properly, VPN
solutions are easy to use and sometimes can be made to work automatically as part of
network sign on.
VPN technology also works well with WiFi local area networking. Some organizations
use VPNs to secure wireless connections to their local access points when working
inside the office. These solutions provide strong protection without affecting performance
excessively.
Limitations of a VPN
Despite their popularity, VPNs are not perfect and limitations exist as is true for any
technology. Organizations should consider issues like the below when deploying and
using virtual private networks in their operations:
1. VPNs require detailed understanding of network security issues and careful
installation / configuration to ensure sufficient protection on a public network like
the Internet.
3. Historically, VPN products and solutions from different vendors have not
always been compatible due to issues with VPN technology standards.
Attempting to mix and match equipment may cause technical problems, and
using equipment from one provider may not give as great a cost savings.
VPN tunneling
Virtual private network technology is based on the idea of tunneling. VPN tunneling
involves establishing and maintaining a logical network connection (that may contain
intermediate hops). On this connection, packets constructed in a specific VPN protocol
format are encapsulated within some other base or carrier protocol, then transmitted
between VPN client and server, and finally de-encapsulated on the receiving side.
For Internet-based VPNs, packets in one of several VPN protocols are encapsulated
within Internet Protocol (IP) packets. VPN protocols also support authentication and
encryption to keep the tunnels secure.
VPN supports two types of tunneling - voluntary and compulsory. Both types of tunneling
are commonly used.
In voluntary tunneling, the VPN client manages connection setup. The client first makes
a connection to the carrier network provider (an ISP in the case of Internet VPNs). Then,
the VPN client application creates the tunnel to a VPN server over this live connection.
In compulsory tunneling, the carrier network provider manages VPN connection setup.
When the client first makes an ordinary connection to the carrier, the carrier in turn
immediately brokers a VPN connection between that client and a VPN server. From the
client point of view, VPN connections are set up in just one step compared to the two-
step procedure required for voluntary tunnels.
Compulsory VPN tunneling authenticates clients and associates them with specific VPN
servers using logic built into the broker device. This network device is sometimes called
the VPN Front End Processor (FEP), Network Access Server (NAS) or Point of
Presence Server (POS). Compulsory tunneling hides the details of VPN server
connectivity from the VPN clients and effectively transfers management control over the
tunnels from clients to the ISP. In return, service providers must take on the additional
burden of installing and maintaining FEP devices.
Several computer network protocols have been implemented specifically for use with
VPN tunnels. The three most popular VPN tunneling protocols listed below continue to
compete with each other for acceptance in the industry. These protocols are generally
incompatible with each other.
Several corporations worked together to create the PPTP specification. People generally
associate PPTP with Microsoft because nearly all flavors of Windows include built-in
client support for this protocol. The initial releases of PPTP for Windows by Microsoft
contained security features that some experts claimed were too weak for serious use.
Microsoft continues to improve its PPTP support, though.
The original competitor to PPTP for VPN tunneling was L2F, a protocol implemented
primarily in Cisco products. In an attempt to improve on L2F, the best features of it and
PPTP were combined to create a new standard called L2TP. Like PPTP, L2TP exists at
the data link layer (Layer Two) in the OSI model -- thus the origin of its name.
PPTP
PPTP works on a client server model. PPTP clients are included by default in Microsoft
Windows and also available for both Linux and Mac OS X. Newer VPN technologies like
L2TP and IPsec may replace PPTP someday, but PPTP remains a popular network
protocol especially on Windows computers.
PPTP technology extends the Point to Point Protocol (PPP) standard for traditional dial-
up networking. PPTP operates at Layer 2 of the OSI model. As a network protocol,
PPTP is best suited for the remote access applications of VPNs, but it also supports
LAN internetworking.
PPTP - Point-to-Point Tunneling Protocol - extends the Point to Point Protocol (PPP)
standard for traditional dial-up networking. PPTP is best suited for the remote access
applications of VPNs, but it also supports LAN internetworking. PPTP operates at Layer
Using PPTP
PPTP packages data within PPP packets, then encapsulates the PPP packets within IP
packets (datagrams) for transmission through an Internet-based VPN tunnel. PPTP
supports data encryption and compression of these packets. PPTP also uses a form of
General Routing Encapsulation (GRE) to get data to and from its final destination.
PPTP-based Internet remote access VPNs are by far the most common form of PPTP
VPN. In this environment, VPN tunnels are created via the following two-step process:
1. The PPTP client connects to their ISP using PPP dial-up networking
(traditional modem or ISDN ).
2. Via the broker device (described earlier), PPTP creates a TCP control
connection between the VPN client and VPN server to establish a tunnel. PPTP
uses TCP port 1723 for these connections.
PPTP also supports VPN connectivity via a LAN. ISP connections are not required in
this case, so tunnels can be created directly as in Step 2 above.
Once the VPN tunnel is established, PPTP supports two types of information flow:
• control messages for managing and eventually tearing down the VPN
connection. Control messages pass directly between VPN client and server.
• data packets that pass through the tunnel, to or from the VPN client
Once the TCP connection is established in Step 2 above, PPTP utliizes a series of
control messages to maintain VPN connections. These messages are listed below.
Number Name Description
With control messages, PPTP utlizes a so-called magic cookie . The PPTP magic
cookie is hardwired to the hexadecimal number 0x1A2B3C4D. The purpose of this
cookie is to ensure the receiver interprets the incoming data on the correct byte
boundaries.
PPTP Security
PPTP supports authentication , encryption , and packet filtering . PPTP authentication
uses PPP-based protocols like EAP, CHAP, and PAP. PPTP supports packet filtering on
VPN servers. Intermediate routers and other firewalls can also be configured to
selectively filter PPTP traffic.
In general, PPTP relies on the functionality of PPP for these aspects of virtual private
networking.
PPTP directly handles maintaining the VPN tunnel and transmitting data through the
tunnel. PPTP also supports some additional security features for VPN data beyond what
PPP provides.
PPTP remains a popular choice for VPNs thanks to Microsoft. PPTP clients are freely
available in all popular versions of Microsoft Windows. Windows servers also can
function as PPTP-based VPN servers.
One drawback of PPTP is its failure to choose a single standard for authentication and
encryption. Two products that both fully comply with the PPTP specification may be
totally incompatible with each other if they encrypt data differently, for example.
Concerns also persist over the questionable level of security PPTP provides compared
to alternative
Virtual private network
VPN follows a client and server approach. VPN clients authenticate users, encrypt data,
and otherwise manage sessions with VPN servers utilizing a technique called tunneling .
VPN clients and VPN servers are typically used in these three scenarios:
The main benefit of a VPN is the lower cost needed to support this technology compared
to alternatives like traditional leased lines or remote access servers.
VPN users typically interact with simple graphical client programs. These applications
support creating tunnels, setting configuration parameters, and connecting to and
disconnecting from the VPN server. VPN solutions utilize several different network
protocols including PPTP, L2TP, IPsec, and SOCKS.
VPN servers can also connect directly to other VPN servers. A VPN server-to-server
connection extends the intranet or extranet to span multiple networks.
Many vendors have developed VPN hardware and software products. Some of these do
not interoperate due to the immaturity of some VPN standards.
IPsec has been the traditional choice for implementing VPN security on corporate
networks. Enterprise-class network appliances from companies like Cisco and Juniper
implement the essential VPN server functions in hardware. Corresponding VPN client
software is then used to log on to the network. IPsec operates at the layer 3 (the
Network layer) of the OSI model.
Some organizations use an IPsec (or sometimes SSL) VPN to protect a Wi-Fi local area
network. In fact, Wi-Fi security protocols like WPA2 and WPA-AES are designed to
support the necessary authentication and encryption without the need for any VPN
support.
IPsec
Technically, IPsec functions at the network layer (Layer 3) of the OSI model . IPsec is
supported in Microsoft Windows (Win2000 and newer versions) as well as most forms of
Linux / Unix.
netpipe-tcp
Definition: netpipe-tcp : A network performance tool using the TCP protocol NetPIPE is
a protocol independent performance tool that encapsulates the best of ttcp and netperf and
visually represents the network performance under a variety of conditions. By taking the
end-to-end application view of a network, NetPIPE clearly shows the overhead associated
with different protocol layers. NetPIPE answers such questions as: how soon will a given
data block of size k arrive at its destination? Which network and protocol will transmit
size k blocks the fastest? What is a given network's effective maximum throughput and
saturation level? Does there exist a block size k for which the throughput is maximized?
How much communication overhead is due to the network communication protocol layer
(s)? How quickly will a small (( 1 kbyte) control message arrive, and which network and
protocol are best for this purpose? This package uses a raw TCP protocol to measure
network performance.
Computer Glossary
Packet filters: security method that filter by IP address; not adequate security for a
network
Packets: data structures that collectively represent the transmission stream (headers and
data); associated with the network layer when the communication protocol is connection-
oriented
PAD (packet assembler/disassembler): assembles X25 packets on the sending end for
transmission over the X25 PSDN, or disassembles X25 packets on the receiving end for
onward transmission to the local network
Parallel port: port where the bits travel down parallel paths, arriving one byte at a time;
can supply more bytes of data per unit time
Passive hubs: used in a LAN environment; special form of repeater that allow multiple
devices to be wired into a central location and share the same media; do not regenerate
(repeat) the signal
Path layer: layer of the OSI physical layer that is responsible for reliable end-to-end
transport and payload delivery, including automatic recovery from failure points
PBX (private branch exchange): a telephone exchange that serves a particular business
or office
PCM (pulse code modulation): process for converting from analog to digital
PDU (protocol data unit): information that is delivered as a unit among peer entities of
a network; in layered systems, a unit of data that is specified in a protocol of a given layer
Phase: where in the wave cycle the wave currently is; measured in degrees
Ping: sonar concept implemented with the Echo Request and Echo Reply application;
basic connectivity test between two TCP/IP network devices
POP (Post Office Protocol): how clients access their mailboxes on the messaging
server; usually done in its third version, POP3
POST (power-on self-test): the pre-boot sequence for a computer, router, or printer
POTS (plain old telephone service): standard telephone service, the basic form of
residential and small business telephone service
Process and application layer: Part of the TCP/IP model that performs the same
functions as the application, presentation, and session layers of the OSI model
Processor: brain of the computer system where calculations and decisions are made; also
referred to as the CPU
Processor memory: referred to as the L1 (level 1), an interface between the processor
and the cache
Protocol: set of rules used to control the exchange of information that is understood by
the transmitter and receivers
Proxy server: sits between the network router and the Internet; talks to the Internet on
behalf of a network’s resources, allowing real network addresses to be hidden
PSTN (public switched telephone network): the network of the world’s public circuit-
switched telephone networks; in much the same way the Internet is the network of the
worlds’ public IP-based packet switched networks
PU (physical unit): a value or magnitude conventionally adopted as a unit or standard of
physical measurements (e.g., length, mass, and time); identifies a network node that
supports communication sessions between logical units (LU) which represent end users
in IBM's SNA
PVCs (permanent virtual circuits): use a real, shared circuit in the service provider’s
backbone
QoS (quality of service): the capability of a network to provide better service to selected
network traffic over various technologies
RAM (random access memory): chips capable of storing and later dumping data in
preparation for other uses
RAS (remote access service): allows users to access the network through dial-up modem
connections
Remote login: allows a user at one computer to interact with another, as if the user’s
computer is directly attached to the remote computer
Removable storage: a way to store information on disks that can be removed and used
on different systems; most removable drives (also known as floppy drives) use a hard 3.5
inch disk
Repeaters: regenerate and reshape digital pulses and allow a signal to be transmitted
further than a single circuit can achieve
ROM (read-only memory): chips that store data that needs to be maintained constantly
Routers: basic piece of network hardware necessary to connect one network to another;
makes decisions about packet forwarding based on IP address information in the packet;
directs traffic between network segments
RTMP (routing table maintenance protocol): a communication protocol used by
AppleTalk to ensure that all routers on the network have consistent routing information
SAPs (service access points): represent internal software addresses in the sending or
receiving computer
SAR (segmentation and reassembly): the process used to fragment and rebuild packets
that allows them to be transported across asynchronous transfer mode (ATM)
SEAL (simple and efficient AAL): method of relaying ATM (asynchronous transfer
mode) cells between ATM Layer and a higher layer
Section layer: layer of the OSI physical layer that creates frames, monitors the
conditions of the transmission between the SONET equipment, and converts optical
signals to and from electrical signals
Security routines: protect data and applications from unauthorized use, execution, or
change
Semaphores: messages sent when a file is opened that prevent other users from opening
the same file at the same time and compromising the integrity of the data
Serial port: handles data one bit at a time traveling sequentially across a single line from
one device to the next
Simplex transmission: the information always flows from the transmitter to one or more
receivers with no provision for a return signal; like radio and TV broadcasts
SMTP (simple mail transfer protocol): electronic mail service that allows a user to
send or receive messages
SOCKS (an abbreviation of SOCKetS): protocol for handling TCP though a proxy
server; library of software added to an individual application for secure communication
through the firewall
TDM (time-division multiplexing): used in the T1 frame format; different channels are
multiplexed by being assigned their own individual time slots
Transport layer: layer that is responsible for delivering information in sequence and to
the correct end-user
Trap: SNMP protocol function used by the agent in a managed device to report
important events or alarms
Topology: the physical (how the wires are laid out) and/or logical (how the wires work)
arrangement of the devices on the network
USB (universal serial bus) port: designed to replace the RS-232 connection with one
that can handle up to 127 devices; comes in 15 Mbps or 12 Mbps speed
USENET (USEr NETwork): Internet service that enables open forum discussions with
people all over the world through newsgroups
UTP (unshielded twisted-pair): the most common cable used in computer networking
VBR (variable bit rate): transmissions that are not time sensitive - the receiving
computer can reconstruct the information regardless of how quickly or in what order the
parts are received; also called “bursty” transmission
VCI (virtual channel identifier): identifies the virtual channel between ATM switch
nodes
VoIP (Voice over Internet Protocol): routing of voice conversations over the Internet or
through any other IP-based network; also called telephone, broadband phone
Volatile memory: chips that lose whatever information they are holding if power is
interrupted
VPI (virtual path identifier): traces the virtual path, from endpoint-to-endpoint, through
the ATM network
WC3 (World Wide Web Consortium): user and developer forum dedicated to
developing interoperable Web technologies (specifications, guidelines, software, and
tools)
Wi-Fi: describes the underlying technology of wireless local area networks (WLAN)
based on IEEE specifications; originally developed for mobile computing devices in
LANs, but is now used for more services, including Internet and VoIP phone access
WWW (World Wide Web): server-based application that organizes information using
hypermedia
xDSL (digital subscriber line): technologies that provide digital data transmission over
the wires of a local telephone network